D2 Protecting data
The features, uses and implications of systems and procedures used to protect the data of
individuals and organisations.
• Processes and implications of techniques for protecting data and systems:
o file permissions
o access levels
o backup and recovery procedures
o passwords
o physical access control
o digital certificates
o protocols.
• The features, characteristics and implications of using antivirus software to protect data.
• The features, characteristics and implications of using firewalls to protect data.
• The features, applications and implications of encryption methods used to protect:
o stored data
o data during transmission.
• The role of current legislation in protecting data and IT systems from attack and misuse.
• The impact on individuals and organisations of legislation designed to protect data and IT
systems.
• The purpose, role and impact, on individuals and organisations, of codes of practice for the
protection of data produced by the Information Commissioner’s Office (UK) and
professional bodies.
Links to Learning Outcomes |
Links to Assessment criteria |
|
---|---|---|